training.phriendlyphishing.com
Open in
urlscan Pro
18.155.68.45
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD-CKRlUj
Submission: On January 08 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on December 7th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 103.13.69.19 103.13.69.19 | 17819 (ASN-EQUIN...) (ASN-EQUINIX-AP Equinix Asia Pacific) | |
1 1 | 13.33.88.30 13.33.88.30 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 18.155.68.45 18.155.68.45 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 172.253.118.95 172.253.118.95 | 15169 (GOOGLE) (GOOGLE) | |
1 | 74.125.200.95 74.125.200.95 | 15169 (GOOGLE) (GOOGLE) | |
2 | 18.155.68.64 18.155.68.64 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.33.88.13 13.33.88.13 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 5 |
ASN17819 (ASN-EQUINIX-AP Equinix Asia Pacific, SG)
PTR: xdk-au.mimecast.com
protect-au.mimecast.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-33-88-30.sin2.r.cloudfront.net
raffle-draw.lang-en.us |
ASN16509 (AMAZON-02, US)
PTR: server-18-155-68-45.sin52.r.cloudfront.net
training.phriendlyphishing.com |
ASN15169 (GOOGLE, US)
PTR: sl-in-f95.1e100.net
fonts.googleapis.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-155-68-64.sin52.r.cloudfront.net
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-33-88-13.sin2.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
phriendlyphishing.com
training.phriendlyphishing.com |
18 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
3 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 127 ajax.googleapis.com — Cisco Umbrella Rank: 520 |
32 KB |
2 |
mimecast.com
2 redirects
protect-au.mimecast.com — Cisco Umbrella Rank: 701612 |
2 KB |
1 |
lang-en.us
1 redirects
raffle-draw.lang-en.us |
1 KB |
13 | 6 |
Domain | Requested by | |
---|---|---|
7 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
2 | protect-au.mimecast.com | 2 redirects |
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
1 | raffle-draw.lang-en.us | 1 redirects |
13 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2022-12-07 - 2024-01-05 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-11-28 - 2023-02-20 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2022-05-12 - 2023-06-10 |
a year | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD-CKRlUj
Frame ID: AA84F31E8BBD65451038215562753E7A
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Training LauncherPage URL History Show full URLs
-
https://protect-au.mimecast.com/s/WDyzCyojv1hlJrNSZTAaB?domain=raffle-draw.lang-en.us
HTTP 307
https://protect-au.mimecast.com/r/nsLUYlwxUR5OTUKfxNtgO-EB44__P1w_2icPVYrhqBzJNc7tPKNLga4g4T5oDpTzbuciUREYP0... HTTP 307
http://raffle-draw.lang-en.us/raffle/?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD-CKRlUj HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://protect-au.mimecast.com/s/WDyzCyojv1hlJrNSZTAaB?domain=raffle-draw.lang-en.us
HTTP 307
https://protect-au.mimecast.com/r/nsLUYlwxUR5OTUKfxNtgO-EB44__P1w_2icPVYrhqBzJNc7tPKNLga4g4T5oDpTzbuciUREYP0JhT_Tm413WKmItvVgKdSwC6l8CHXz7MyK6Mya2XAaWcOrKg_FgBvSqv1dkHqzaEODqM0EGSapU8hpZEW9jTpvssauWw9e3w11bTqdFYQKDfPqbSZcuhpbzwSBXH_kHIxjI81a7DXBRtBFNgr_ZpNxBzZh2a0trn_CUiqaJwtTdbQG2UAvBGUcdZjDQyvfMXp7t4haa5Ht6A3kGEVdig-VVT8GFBSbME07OrNFMZ-Molgv-BcIQH2B5igZys25X-YXD9l1VeSZIkgUUPDEg0GP2Q66N9L-glAPxFdq2EY3-QnEzbnIdNcjLmnsTMCXsEIn0lGOdXvujTT5mXIZP94473gq-M-64cfa8iW9mKINGwLa-c8Njx7vVb3Myu09rFygoFKgku0pvMjDpoyIbr6ptrGN7tZ2E56DLx_kO3Ko2TaRu3bSLckadqZfMPSVFHQOPtaOnO-zCjt8IdJJutvawkSqO1XAdt1efX6QO74N-mncGYGYT84ZDqm7qE5NwVNuKwExjh3NvYQnAIJraD-edFutbqOgS8vu57CKR9iLHRbY-tj1hq86YvInwVLGoLhnOZBCcq_Ks02b5z5ruxf221d2JIAXQWc-UuerPJ3YU2a01JKA9_qYajmiMrNKuJSlx4TKc8SOJMbNojwDTza-WV1ebUuo_MDRq7_K95KKi8zv6_aJpF5M2FcPmsA5FWMlbY1sIng3MFrpUn8dajPdSSoDcJ2B9Oq2Of04UppsNKZTaVzoFD8NW0BmpHSTw047wgsiKvirkLGiHygR4pVqHeG0-Z9nGuSp4zTQSL2VrJi_w92iKJFZC0EIPOUcTxYjxN-fIPScFDuXL0j9y1a00GMIdtxqQWFYWCIrqAc44JW743pIF5AsroGH-z5uMERkR6mcBaMoPZapvkq-coUQOYmfa8wfWqbfIHFw_29efSEbGOvLSzsVVk9DFodtOyUtgp1A0hPxyZXrp6wTjAZyizu0iny6HAriBlRv1qjE3fu_N7nkywUnM27UWpVz3jyz9_sPzZpkhGQ0zClwKZ0HxC29hAPo85wGGsuY6AvWNP_UyHnNXq6VcZ14VLlcxOnMPqD00RgKEN5DLe7WxWAU9BnPz9v_XPWCd4f7yTq5YXmGNlntRvtAraB45DRZ2DfMn_N0BULZnSlhgTE8ZTWxodUmj-mJJR6ROH-zjpPrmT6VCNeTW5V_H0q-b7VQTOLN860VYhzzKg47RUjBlu-egV-kp6stwK9ZWGfk7OSlZ50PHHTmGtxamAmWqEFtxOeJGJIKpbnUTfaJb7s1JCxAosn5kuq-vFdwWREH9JmBUlFEWS62qqgEJwjCMR0h0avZOtQPJ9I8tLDtQQ3ThsMtHV-P24AznYhR4XNdNS9AfxIA_ipSCjJ-SvfHjLjzKDWtEzuFwr9jSinnR1p1NhzDpl101mBGLWoOWtBs20Bzyhw7hJ21_VWKOo3xkJ-eKdZqFukMDEIyFEUvkCqYtjWkgdze0QOJpsgFeoFGnBieBPkEGRavn310WPRY5ow-iG0pDpi8-REO1hjbkzOT1dojkTfj059-MkPLsQxqcRC-7dinAQ3T6XagvDKJLEf7aBN45IT3X5_-LgtpuXtSO-ww6Py7A_lBE-_IZVu1wt6pe96muRqPR3OMgmZ2EuxljwCE0j3jkvV9YAAVwr6uxiTRW6JBzVEtlXm9h5qqZARca5Mjix--wMoZ0bnHZ2EK0IMnz5qz5li7U3Vmk5O0FqgcMReogiYKmVlzg_sAXqcitqd2XZlqFfS0UZmwPl8-JYIQDrM96PjYehD73ekoY5cDXsaO-n2BHhMiWuHuF_L_c2kIT2Zfv7Juc HTTP 307
http://raffle-draw.lang-en.us/raffle/?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD-CKRlUj HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=7TbbcxPewebUG4mhaeDGViee-0V3XGfr&p=NaCaSOiJ0-WuAtKM8OXXPUqGD-CKRlUj Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 758 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 928 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
2 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
raffle-draw.lang-en.us/ | Name: XSRF-TOKEN Value: h%2Ffi6HfYu0s4NCAOH2KUESjZk9Qf5jDjE9ccRFUngbJ3J9r2RqFvPYrl%2B2ZXRYTsoB9QpwAgCNIx3R7m3DH%2BzA%3D%3D |
|
raffle-draw.lang-en.us/ | Name: _session_id Value: 04a19f3db66b9d2ea04f0bd8964d632d |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX2xlc3NvbnMvKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTcyMjQzNjE5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: U-QI-OPYMYTxt4ll7ZLUDEtcnIcxdq9gCpxF3hYLl2TbZ7h4mUtiwGtT7dSl6i~-WqU9UIE8eX6kwU9JDYJYm0yx1uD175hlPM2-YZOCCHkFhRMB~z0hiE-~Ziq82ePAKllLU6sjao~fQJJazLl1Z3ZXd1fCngR2D8zZFrwskSuERjSYYrqBBIw9Y2jr6lsyOyY3hOXAuXaf-WfpttdckTfCL6EQk9Sw53DkBH3iCwJ8bH1RmDPT1BoKOBrf48W9YDMdpoNeT8Bs3GG6ollx1RX1hPAhZppbxo7AIki4uygPS~DNKdT-m71P~33k9EcX6f5pICqeyEV9MkvP1w7p8A__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAQ275XTV4OPFI2O7M |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IjdUYmJjeFBld2ViVUc0bWhhZURHVmllZS0wVjNYR2ZyOk5hQ2FTT2lKMC1XdUF0S004T1hYUFVxR0QtQ0tSbFVqIiwiZmlyc3RfbmFtZSI6IkphbWVzIiwibGljZW5zZV9lbmQiOiIyMDI0LTA4LTAxVDAwOjI5OjU5KzEwOjAwIn0sImlhdCI6MTY3MzIyMDYzNCwiZXhwIjo1MDg4ODc4NDY4OX0.T7DUxnzfm6xHFU1zbU_34F-HcHKZm-AnMyDum7Z9z6Q |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_680%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fhvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IjdUYmJjeFBld2ViVUc0bWhhZURHVmllZS0wVjNYR2ZyOk5hQ2FTT2lKMC1XdUF0S004T1hYUFVxR0QtQ0tSbFVqIiwiZmlyc3RfbmFtZSI6IkphbWVzIiwibGljZW5zZV9lbmQiOiIyMDI0LTA4LTAxVDAwOjI5OjU5KzEwOjAwIn0sImlhdCI6MTY3MzIyMDYzNCwiZXhwIjo1MDg4ODc4NDY4OX0.T7DUxnzfm6xHFU1zbU_34F-HcHKZm-AnMyDum7Z9z6Q%26actor%3D%257B%2522name%2522%3A%255B%2522James%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3D734cbff0-8fac-11ed-9252-a18875ed41eb |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
hvvltkn8sj.execute-api.ap-southeast-2.amazonaws.com
protect-au.mimecast.com
raffle-draw.lang-en.us
training.phriendlyphishing.com
103.13.69.19
13.33.88.13
13.33.88.30
172.253.118.95
18.155.68.45
18.155.68.64
74.125.200.95
11940212d65e15ab8b8d31b5b61acaf924b9c5e725cd32e8483fc7ce089cd57c
21e641da8234dd8e495a0a9445d75f70f3cc9c27b36843ca203917a99b517624
28d434da8a5faa805fa50af28dea71016bcde3e21c04366e124b92812c7021fa
2c66d5d4f3257ab79c870a73bbe1a9787e7f9e56fee41b8d96c8284ba1d22593
32846bdae6467b96299cbbe8709470253f054f0a0c068a271d81539e9e68107d
46e65515e1dd383789acf042af52e464b1186e12b0be7f058019ff1403c9e22f
79acf10f7d6c86166be06bed49f20fa283015eb981af4b0e45871d7069f48de5
cc8e1a9d4e045bda68a9c989e4899c724a738c104698b27dc1af5fb82c4d9fd0
cd1cc91691b5adedfdb21e62e0d6c8290e91ee324d8120ac97541d754ef33ce5
d24d9f0fe03f3cdb5bc977876c2f166113f93871bc515856de050f10548e7191
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
fc1e5c4c494e54c864acb951d9fc922a92cc4e3013c9224578a82a619c3a5e53